Quantum News | Quantum Supremacy

China’s Long March to Tech Supremacy

China’s Long March to Tech Supremacy

One of the world’s deepest-diving manned submersibles, the titanium-shelled, lithium battery-powered Fendouzhe was constructed using an innovative welding method and can carry up to three passengers. ’s “Digital Xiong’an Program” connecting the city’s transportation, energy and water supply systems to Alibaba Cloud, enabling self-adjustment based…

Continue Reading...

Quantum Computing | Quantum News

How the next National Defense Strategy can get serious about emerging technologies

How the next National Defense Strategy can get serious about emerging technologies

Consider, for example, the development and deployment of 5G networks, where the United States is already behind China’s Huawei. US adversaries including China, Iran, and Russia are investing in additional technological capabilities to counterbalance the United States’ advantages in…

Continue Reading...

Quantum Computing | Quantum News

Four CIO ‘hot tech’ topics to contemplate, from quantum considerations to 5G’s dirty little secret

Four CIO ‘hot tech’ topics to contemplate, from quantum considerations to 5G’s dirty little secret

He sees edge platforms turning horizontal, able to run multiple edge workloads – a software-defined service, consuming capacity – on the same edge platform. Dell now has a simulator running on off-the-shelf technology, albeit one that…

Continue Reading...

Quantum Computing | Quantum News

Oxford Uni’s Wykeham chair is renamed Tencent-Wykeham after a China firm ‘with links to spy agency’

Oxford Uni’s Wykeham chair is renamed Tencent-Wykeham after a China firm ‘with links to spy agency’

Ling Ge, Tencent’s Chief European Representative, an expert in quantum computing research, has a PhD in this field from Oxford. True, Britain’s new National Security Investment Bill, introduced into Parliament last November, now gives extraordinarily…

Continue Reading...

Quantum Computing | Quantum News

Surveillance, encryption, security and Huawei

Surveillance, encryption, security and Huawei

Protocols such as Secure Socket Layer (SSL), Transport Layer Security (TLS) and Secure Hypertext Transfer Protocol (HTTPS) employ encryption to ensure the security of network and, particularly, internet traffic. The US elites’ reaction, initially, was to kill the messenger: they called Snowden a “traitor” and demanded…

Continue Reading...